Information from traditional media sources has played an important role in determining the movement of stock prices. However, in recent times, online social network platforms have promoted a more efficient way to shar...
详细信息
Quite often computer Forensics students are afforded little or no opportunity to gain experience when it comes to retrieving digital evidence from a crime scene. For our offering, the exclusion was attributed to a lac...
详细信息
Biometrics technologies have gained increasing attention across different sectors in the past decade. Face recognition has proven to be one of these successful biometric technologies. For example, law enforcement uses...
详细信息
This work presents AdaptiveSGA, a model for implementing Dynamic Difficulty Scaling through Adaptive Game AI via the Symbiotic Game Agent framework. The use of Dynamic Difficulty Balancing in modern computer games is ...
详细信息
Face recognition. A promise made to the modern technologists as the ultimate access control or surveillance technology. However, it is still vulnerable to inexpensive spoofing attacks, which pose a threat to security....
详细信息
Advances in technologies such as cloud computing and Bring Your Own Technology (BYOT) environments have dramatically changed the way in which organisations do business. Critical Information Infrastructure (CII) is at ...
详细信息
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will ...
详细信息
This paper will present a method for disseminating mobile agents throughout a network in order to protect that network. This method is based on the immune concept of inflammation, which provides greater blood flow to ...
详细信息
At the core of every organisation is a set of electronic assets that enables an organisation to perform its daily operations. This Critical Infrastructure (CI) forms the fundamental core of the organisation. CI is dyn...
详细信息
computer Security Incident Response Teams (CSIRTs) provide information security incident response services to communities. The South African Cybersecurity Hub (SACH) acts as a national point of contact for the coordin...
详细信息
暂无评论